From patchwork Fri Feb 23 22:05:35 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jonatan Schlag via network X-Patchwork-Id: 1673 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) by web02.i.ipfire.org (Postfix) with ESMTP id B4AD460AB7 for ; Fri, 23 Feb 2018 12:06:02 +0100 (CET) X-Virus-Scanned: ClamAV at mail01.ipfire.org Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 242CB108B8A1; Fri, 23 Feb 2018 11:06:18 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=lists.ipfire.org; s=201801; t=1519383978; x=1521975978; bh=5y/ZOYWcDPl8aY3fqqLiIPz+Jv+DkQoWHo104IaPqh0=; h=To:Subject:Date:Message-Id:In-Reply-To:From:Reply-To:Sender:From: To:Cc:Date:Content-Type:Message-ID:In-Reply-To:Subject:Reply-To: Sender; b=cVlJytyzo8b4RarY/j6WzH0m8RKa/bqEJtG+lLceouhF7elYX8eVR2zU3gkkOS37y X7hN/hGLp57EXLZPlapWy9fmzNL0t9+HxNuKAjb1nG1fLq/+k5h2ErBBpTdgkkGijs ufvLkvlZdMiJiOA9kLKaIimZr0sQRss15omr+qQq/YXGkftmASDQgvjjlCwTqyr2RC KXAjUmLM0qSJaPtggp7MlhetKHqBNPmI2mc813Rmwp17afSOtZjVwKlV5eJcJ9Bc2h gqCwAv2QQUsQHaYVaGZGQ0cA+qPpwTP6xUoHsd/42Po0aJjJcOHiVYqlHl28eOrMV3 DgIfqcW2r0sZA== X-Virus-Scanned: ClamAV at mail01.ipfire.org Received: from localhost.localdomain (unknown [10.172.1.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 94148108B8A1; Fri, 23 Feb 2018 11:06:15 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ipfire.org; s=201801; t=1519383975; x=1521975975; bh=5y/ZOYWcDPl8aY3fqqLiIPz+Jv+DkQoWHo104IaPqh0=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:From:To:Cc:Date: Content-Type:Message-ID:In-Reply-To:Subject:Reply-To:Sender; b=YAfyeiX2ZxFD2zk4sRbAchOindCrFi2PNYG4R9sM2H0O4Ra71Pa3GpHpbVvJjSHKH Q2uY8QeEUa5ELeqP/cwrHW7JfkOcEgypD99v+FPnUoo78gPWLsCTTmiRwAl0WS2G2f SE1pakHncbCdbQZ2Vzi1M1J33zHkIrp5er53ux5egxJRYyPCnM9TMTyp0Xy+/lScj5 HJf+v/6J1L9ete/nMOJ+dhDn/UV/JxUI7RXiymXdM7HgLom0n1mQqZxRKz+FiCSttX gsr7Z1qCqbfzOCaMHshGwee2XGzwpS5DVSN5TJMFmkckAcqcnB8iQB1xEjmE7Bf6gZ 6nCkGeWDUgSvA== To: network@lists.ipfire.org Subject: [PATCH 3/3] IPsec: Log the content of all PLUTO variables in debug mode Date: Fri, 23 Feb 2018 11:05:35 +0000 Message-Id: <1519383935-3556-3-git-send-email-jonatan.schlag@ipfire.org> X-Mailer: git-send-email 2.6.3 In-Reply-To: <1519383935-3556-1-git-send-email-jonatan.schlag@ipfire.org> References: <1519383935-3556-1-git-send-email-jonatan.schlag@ipfire.org> X-BeenThere: network@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List for the network package List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Jonatan Schlag via network From: Jonatan Schlag via network Reply-To: Jonatan Schlag Errors-To: network-bounces@lists.ipfire.org Sender: "network" Signed-off-by: Jonatan Schlag --- src/helpers/ipsec-updown | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/helpers/ipsec-updown b/src/helpers/ipsec-updown index e4d704d..12ead03 100644 --- a/src/helpers/ipsec-updown +++ b/src/helpers/ipsec-updown @@ -29,6 +29,13 @@ network_settings_read # Make sure we are called by strongSwan assert isset PLUTO_VERSION +if enabled DEBUG; then + while read line; do + [[ ${line} =~ ^PLUTO_ ]] || continue + log DEBUG " ${line}" + done <<< "$(printenv | sort)" +fi + CONNECTION="${PLUTO_CONNECTION}" if ! ipsec_connection_read_config "${CONNECTION}"; then